Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs

被引:0
作者
Pang, Xin [1 ]
Chen, Lanxiang [1 ,2 ]
机构
[1] Fujian Normal Univ, Coll Comp & Cyber Secur, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Peoples R China
[2] City Univ Macau, Fac Data Sci, Taipa 999078, Macao, Peoples R China
基金
中国国家自然科学基金;
关键词
Bipartite graphs; Structured encryption; Butterfly counting; Private set intersection;
D O I
10.1016/j.jisa.2024.103952
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bipartite graphs have numerous real-world applications, with the butterfly motif serving as a key higher order structure that models cohesion within these graphs. Analyzing butterflies is crucial fora comprehensive understanding of networks, making butterfly counting a significant focus for researchers. In recent years, various efficient methods for exact butterfly counting, along with sampling-based approximate schemes, have been proposed for plaintext bipartite graphs. However, these methods often overlook data privacy concerns, which are critical in real-world scenarios such as doctor-patient and user-item relationships. Additionally, traditional encryption methods do not work due to the nature of graph structures. To tackle these challenges, we propose two schemes for exact butterfly counting on encrypted b ipartite graphs (EB-BFC), enabling butterfly counting for specific vertices or edges to protect privacy of butterfly counting. Firstly, we demonstrate how structured encryption techniques could be used to encrypt the bipartite graph and construct a secure index, resulting in the efficient, privacy-preserving scheme EB-BFC1. Secondly, to ensure vertex data privacy, we propose a butterfly counting scheme based on Private Set Intersection, EB-BFC2. Finally, we demonstrate the security and efficiency of our proposed schemes through theoretical proofs and experiments on real-world datasets.
引用
收藏
页数:10
相关论文
共 33 条
  • [1] Triangle counting in large networks: a review
    Al Hasan, Mohammad
    Dave, Vachik S.
    [J]. WILEY INTERDISCIPLINARY REVIEWS-DATA MINING AND KNOWLEDGE DISCOVERY, 2018, 8 (02)
  • [2] Network medicine: a network-based approach to human disease
    Barabasi, Albert-Laszlo
    Gulbahce, Natali
    Loscalzo, Joseph
    [J]. NATURE REVIEWS GENETICS, 2011, 12 (01) : 56 - 68
  • [3] Bienstock A, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P301
  • [4] Improved Private Set Intersection for Sets with Small Entries
    Bui, Dung
    Couteau, Geoffroy
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 190 - 220
  • [5] Efficient Temporal Butterfly Counting and Enumeration on Temporal Bipartite Graphs
    Cai, Xinwei
    Ke, Xiangyu
    Wang, Kai
    Chen, Lu
    Zhang, Tianming
    Liu, Qing
    Gao, Yunjun
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2023, 17 (04): : 657 - 670
  • [6] Chakraborti A, 2023, PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, P319
  • [7] Structured Encryption and Controlled Disclosure
    Chase, Melissa
    Kamara, Seny
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 577 - 594
  • [8] Privacy-Preserving Triangle Counting in Large Graphs
    Ding, Xiaofeng
    Zhang, Xiaodong
    Bao, Zhifeng
    Jin, Hai
    [J]. CIKM'18: PROCEEDINGS OF THE 27TH ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, 2018, : 1283 - 1292
  • [9] Privacy-preserving Triangle Counting in Distributed Graphs
    Do, Hoang Giang
    Ng, Wee Keong
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 917 - 924
  • [10] Dong C., 2013, P 2013 ACM SIGSAC C